Sei sulla pagina 1di 25

Considerations,

Best Practices
and Requirements
for a Virtualised
Mobile Network
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

About the GSMA


The GSMA represents the interests of mobile operators
worldwide, uniting nearly 800 operators with almost 300
Network 2020
The GSMA’s Future Networks Programme is designed to
help operators and the wider mobile industry to deliver all-IP
Contents
companies in the broader mobile ecosystem, including handset networks so that everyone benefits regardless of where their
and device makers, software companies, equipment providers starting point might be on the journey.
and internet companies, as well as organisations in adjacent
industry sectors. The GSMA also produces industry-leading The programme has three key work-streams focused on:
events such as Mobile World Congress, Mobile World Congress The development and deployment of IP services, The
Shanghai, Mobile World Congress Americas and the Mobile 360 evolution of the 4G networks in widespread use today, 1 Introduction 3 5.1.4 NFV carrier-grade reliability scope 24
Series of conferences. The 5G Journey developing the next generation of mobile 1.1 Scope 4 5.2 Carrier Grade Service – Requirements 26
technologies and service. for NFV Reliability
For more information, please visit the GSMA corporate website
1.2 Definitions 4
at www.gsma.com. Follow the GSMA on Twitter: @GSMA. For more information, please visit the Network 2020 website 1.3 Abbreviations 5 5.3 NFV Reliability Assessment Standard 26
at: www.gsma.com/network2020 5.4 Best Practices 28
1.4 References 6
5.4.1 Use case scenarios 28
2 NFV reference architecture 7 5.5 Conclusion 29

3 Requirements for Network Orchestrators 9 6 Migration 31


3.1 Introduction 10 6.1 Introduction 32
3.1.1 Network Services 10 6.1.1 Migration from physical network to 32
3.1.2 Virtualised Network Functions 11 virtualised network
3.1.3 Network Functions Virtualisation 11 6.1.2 Software upgrades 32
With thanks to contributors: Infrastructure 6.1.3 Interoperability 32
AT&T
3.2 NFV Orchestrator functional requirements 11 6.2 Best practices 32
China Mobile
China Telecom 3.3 Other NFV related architectures 12 6.2.1 Migration 32
China Unicom 3.4 Best Practices 14 6.2.2 Software upgrades 33
KDDI
3.4.1 Planning on NFV based network 14 6.3 Requirements 34
KT
LG Uplus management and orchestration 6.3.1 Migration 34
NTT DoCoMo architecture
6.3.2 Software upgrades 34
Orange 3.4.2 Example of 5G Telco-MANO architecture 15
Proximus
America Movil 7 Performance benchmark for NFV 35
4 Virtualised network security 17 infrastructure
SK Telecom
Telecom Italia 4.1 Introduction 18 7.1 Performance benchmark scope 36
Telefónica 4.1.1 Maturity 18
Telekom Austria 7.2 State of the art in NFV performance 37
Telenor Group 4.2 Architectural Challenges 18 benchmarking
TeliaSonera 4.3 Best practices 19
T-Mobile US 8 Vertical interoperability 41
4.4 Conclusions 19
United States Cellular
4.5 Actions 19 8.1 Introduction 42
Vodafone
Ascom Network Testing 8.2 Requirements for vertical interoperability 42
Cisco 5 Carrier grade NFV/ Reliability 21 8.3 Challenges and potential risks 42
Ericsson
5.1 Introduction 22 8.4 Best Practices 43
Gemalto
HP 5.1.1 Carrier-grade 22
Huawei 5.1.2 The essential value of carrier-grade 22
Nokia
reliability
Oracle America
Samsung Electronics 5.1.3 NFV carrier-grade reliability challenges 23
ZTE
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

1
Introduction

2 3
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

1.1 Scope 1.2 Those are Definitions Resource orchestration Subset of Network Functions ETSI European Telecommunications
This document outlines the key considerations in Virtualisation Orchestrator Standards Institute
Term Description
functions that are responsible
the deployment of network virtualisation in a mobile ETSI GS ETSI Group Specification
Lifecycle management Set of functions required to for global resource management
network environment. The topics covered within manage the instantiation, governance FCAPS Fault, Configuration, Accounting,
maintenance and termination of a Performance and Security
represent solutions to the potential obstacles mobile Service lifecycle Set of phases for realizing a
Virtualised Network Function or
operators may face when wishing to capitalize on service from conception and GS-O Global Service Orchestration
Network Service
identification to instantiation and
network virtualisation (covering both Network Functions Network controller Functional block that centralizes retirement
ICT Information and Communications
Technology
Virtualisation and Software-Defined Networking). some or all of the control and
Software-Defined Networking A set of techniques that enables
management functionality of a IoT Internet of Things
to directly program, orchestrate,
This document provides an overview of the steps network domain and may provide
control and manage network IPC Instructions Per Cycle
an abstract view of its domain to
mobile operators should take to adopt this technology other functional blocks via well-
resources, which facilitates the
iTLB/dTLB instruction Translation Lookaside
design, delivery and operation
and where appropriate, provide an indication of defined interfaces Buffer / data Translation
of network services in a dynamic
what they will need to complete the work and which Lookaside Buffer
Network Function Functional block within a and scalable manner
external organisations are best placed to deliver it. network infrastructure that has ISB Industry Standard Benchmarking
SDN Orchestration A process that oversees and
well-defined external interfaces
directs a set of software-defined ISG Industry Specification Group
The document also outlines a number of examples and well-defined functional
networking activities and
behaviour KPI Key Performance Indicator
and approaches that have been taken by operators interactions with the objective of
Network Functions Principle of separating Network carrying out certain work in an KVM Kernel-Based Virtual Machine
to identify and address the gaps. These best practice Virtualisation Functions from the hardware automated manner.
L1/L2/LLC Level 1/Level 2/ Last Level Cache
examples are provided as guidance and do not they run on by using virtual
Virtualised Infrastructure Functional block that is
represent the consensus of the GSMA members hardware abstraction Open-O Open Orchestrator Project
Manager responsible for controlling and
participating to this activity. Network Functions Functional block that manages managing the Network Functions OPEX Operating Expense
Virtualisation Orchestrator the Network Service lifecycle Virtualisation Infrastructure
OPNFV Open Platform for NFV
and coordinates the management compute, storage and network
of Network Service lifecycle, resources, usually within one OS Operating System
Virtualised Network Function operator’s Infrastructure Domain OSM Open Source MANO project
lifecycle and NFV infrastructure
Virtualised Network Function Implementation of an Network OSS Operations Support Systems
to ensure an optimized allocation
Function that can be deployed on
of the necessary resources and OVS Open vSwitch
a Network Function Virtualisation
connectivity
Infrastructure PGW Packet Data Network Gateway
Network Functions Totality of all hardware and
Virtualised Network Function Internal component of a PNF Physical Network Function
Virtualisation Infrastructure software components that build
Component Virtualised Network Function
up the environment in which RAN Radio Access Node
providing a defined sub-set
Virtualised Network Functions
of that Virtualised Network RFC Request For Comments
are deployed
Function’s functionality.
Network service orchestration Subset of Network Functions MANO Management and Orchestration
Virtualisation Orchestrator MME Mobility Management Entity
functions that are responsible 1.3 Abbreviations
for Network Service lifecycle MVNO Mobile Virtual Network Operator
management Term Description
NextGen Next Generation
Network service descriptor Template that describes the API Application Programming
NF Network Function
deployment of a Network Service Interface
including service topology NFV Network Functions Virtualisation
ATIS The Alliance for
as well as Network Service Telecommunication Industry NFV-O Network Functions Virtualisation
characteristics such as Service Solutions Orchestrator
Layer Agreements for the
Network Service on-boarding BSS Business Support Systems NFVI Network Functions Virtualisation
and lifecycle management of its Infrastructure
CAPEX Capital Expenditure
instances NOC Network Operations Centre
CNI Critical Network Infrastructure
Network Service Composition of Network NS Network Service
Functions and defined by its CPU Central Processing Unit
functional and behavioural SDN Software Defined Networking
DPDK Data Plane Development Kit
specification SDN-O Software Defined Networking
DUT Device Under Test
Orchestration Type of composition where one Orchestration
particular element is used by ECOMP Enhanced Control, Orchestration,
SHV Standard High Volume
the composition to oversee and Management & Policy
direct the other elements SGW Serving Gateway
EOSL End of Service Life
Quota Upper limit on specific types of UMO Unified Management and
EPC Evolved Packet Core
resources Orchestration
EM Element Management
vACL virtual Local Area Network
Access Lists

4 5
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

vCG-NAPT virtual Concatenation Group [17] GS ETSI NFV ETSI GS NFV 001: “Network Function

2
Network Address Port 001 Virtualisation (NFV); Use Cases”
Translation
[18] GS ETSI TST ETSI GS NFV-TST 001: “pre-
vEPC virtual Evolved Packet Core 001 deployment testing, report on
validation of NFV environments and
vFW virtual Fire Wall
services”
vMME virtualised Mobility Management
[19] GS ETSI TST ETSI GS NFV-TST 002: “Testing
Entity
002 Methodology; Report on NFV
vPE virtual Provider Edge Interoperability Testing Methodology”
vSwitch virtual Switch [20] GS ETSI PER ETSI GS NFV-PER 001: “NFV
001 performance and portability best
VIM Virtualised Infrastructure
practices”
Manager

NFV reference
[21] GS ETSI IFA ETSI GS NFV-IFA 003 V2.1.1: “Network
VM Virtual Machine
003 Functions Virtualisation (NFV);
VNF Virtualised Network Function Acceleration Technologies; vSwitch
benchmarking and acceleration
VNFC Virtualised Network Function
specification”
Component

architecture
[22] draft-ietf- https://datatracker.ietf.org/doc/draft-
bmwg-virtual- ietf-bmwg-virtual-net/
1.4 References net-04

Ref Doc Number Title [23] draft-ietf- IETF: draft-ietf-bmwg-ipsec-term-12.


bmwg-ipsec- txt, “Terminology for Benchmarking
[1] GS ETSI NFV Network Functions Virtualization term-12 IPsec Devices”.
002 (NFV); Architectural Framework
[24] draft-ietf- IETF: draft-ietf-bmwg-ipsec-meth-05.
[2] GS ETSI NFV- Network Functions Virtualisation bmwg-ipsec- txt, “Methodology for Benchmarking
MAN 001 (NFV); Management and Orchestration meth-05 IPsec Devices”.
[3] GS ETSI NFV- Network Functions Virtualisation [25] draft-ietf- IETF: draft-vsperf-bmwg-vswitch-
IFA 009 (NFV); Management and bmwg- opnfv-01.txt, “Benchmarking Virtual
Orchestration; Report on Architectural vswitch- Switches in OPNFV”.
Options opnfv-01
[4] GS ETSI NFV- Network Functions Virtualisation [26] draft-kim- IETF: draft-kim-bmwg-ha-
IFA 010 (NFV); Management and bmwg-ha- nfvi-01.txt, “Considerations for
Orchestration; Functional nfvi-01 Benchmarking High Availability of NFV
requirements specification Infrastructure”.
[5] ITU-T Y.3300 Framework of software-defined [27] GS ETSI NFV- ETSI GS NFV-REL001 “Network
networking REL001 Functions Virtualisation (NFV);
[6] ISO/IEC Reference Architecture for Service Resiliency Requirements”
18384-1 Oriented Architecture (SOA RA) Part 1: [28] ETSI NFV-SEC ETSI GS NFV-SEC 007 “Network
Terminology and Concepts for SOA 007 Functions Virtualisation (NFV); Trust;
[7] NGMN 5G white paper Report on Attestation Technologies
and Practices for Secure Deployments”
[8] AT&T Ecomp Enhanced Control, Orchestration,
Management & Policy Architecture; [29] ETSI GS NFV- ETSI GS NFV-SEC 013 “Network
http://about.att.com/content/dam/ SEC 013 Functions Virtualisation (NFV) Release
snrdocs/ecomp.pdf 3; Security; Security Management and
Monitoring specification”
[9] Open-O Open-O architecture; www.open-o.org
[30] ETSI GS NFV- ETSI GS NFV-SEC 012 “Network
[10] OSM Open Source MANO; http://osm.etsis. SEC 012 Functions Virtualisation (NFV) Release
org/ 3; Security; System architecture
[11] ETSI GS NFV- Network Function Virtualisation (NFV); specification for execution of sensitive
REL006 V0.0.3 Reliability; Specification on Software NFV components”
(2016-07) Update Process [31] ETSI TS 103 ETSI TS 103 308 “CYBER; Security
[12] Yardstick https://wiki.opnfv.org/display/ 308 baseline regarding LI and RD for NFV
yardstick and related platforms”

[13] Bottlenecks https://wiki.opnfv.org/display/


bottlenecks
[14] StorPerf https://wiki.opnfv.org/display/storperf
[15] VSPerf https://wiki.opnfv.org/display/vsperf/
VSperf+Home
[16] CPerf https://wiki.opnfv.org/display/cperf

6 7
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

Figure 1 shows the NFV reference architectural and The NFV Orchestrator is responsible for the
functional blocks [1]. The functional blocks are: management and orchestration of NFV infrastructure,

3
• Operations Support Systems (OSS) and Business as well as the software resources and delivering the
Support Systems (BSS). network services on the NFV infrastructure. The ISG
ETSI NFV [3] identifies the following management and
• Element Management (EM);
orchestration data repositories:
• Virtualised Network Function (VNF);
• VNF Catalogue;
• Service, VNF and Infrastructure Description;
• NS Catalogue;
• VNF Manager(s);
• NFV Instances repository;
• NFV Orchestrator;
• NFVI Resources repository
• Virtualised Infrastructure Manager(s) (VIM);
• NFV Infrastructure (NFVI), including hardware and
virtual compute, storage and network resources
The NFV Orchestrator has two main responsibilities:
• Network Service Orchestration: managing the
lifecycle of network services. This includes the
Requirements for
Network Orchestrator
A VNF is an implementation of a Network Function management of the Network Services templates and
that can be deployed in an NFV Infrastructure. VNF Packages. The Network Service Orchestration
Examples of mobile network functions are Mobility provides the management of the instantiation of
Management Entity (MME), Serving Gateway (SGW), VNFs, in coordination with VNF Managers;
Radio Access Node (RAN) and Packet Data Network
• Resource Orchestration: providing an overall view of
Gateway (PGW).
the resources to which it provides access and hides
the interfaces of the VIMs present below it

Figure 1: NFV architecture


Lifecycle management
of Network Services

Management & Orchestration

NFV
OSS/BSS Orchestrator Service,
VNF and
Infrastructure
Description
EM EM EM EM
NFV
Manager(s)
VNF VNF VNF VNF VNF

Virtualised
NVF Infrastructure (NVFI) Infrastructure
Manager(s)

Management of the services Control management of Lifecycle management


provided by the NF the virtualised resources of VNF instances

Source: GS ETSI NFV-002 Network Function Virtualization (NFV); Architecture Framework

8 9
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

3.1 Introduction 3.1.1 Network Services 3.1.2 Virtualised Network Functions 3.2 NFV Orchestrator functional requirements
Network Functions Virtualisation requires a new set of The Network Service Orchestration is responsible for The management and orchestration elements of a VNF The Network Orchestrator shall fulfil all requirements
management and orchestration functions to be added the Network Service lifecycle management including include fulfilment, assurance and security management, specified in clause 6 of ETSI NFV-IFA 010 [5]
to the current model of operations, administration, operations such as: however, the focus in NFV is the decoupling of the VNF applicable to an NFVO. These requirements include
maintenance and provisioning. The Network Functions • On-board and management of Network Service software from the hardware. The decoupling of Network functional requirements for VNF lifecycle, Network
Virtualisation Management and Orchestration has the Descriptors; Functions from the physical infrastructure results in a Service lifecycle and virtual resource management
role of managing the NFVI and control the allocation of new set of management functions that are focused on summarized as follows:
• Instantiate Network Service;
resources needed by the NSs and VNFs. the creation and lifecycle management of virtualised
• Scale Network Service; • Network Service:
resources for the VNF, referred to as VNF Management.
The management and orchestration takes place at • Update Network Service; VNF Management functions are responsible for the VNF’s • lifecycle management (instantiation, scaling,
three different levels as depicted in Figure 2. lifecycle management including operations such as: updating, termination);
• Terminate Network Service
• information management (NS descriptor);
• Instantiate VNF (create a VNF instance using the
• performance management;
VNF on-boarding artefacts);
• fault management
• Scale VNF (increase or reduce the capacity of the
Figure 2: Management & Orchestration at different abstraction levels VNF); VNF:
• Update and/or Upgrade VNF (support VNF • lifecycle management (instantiation, scaling,
software and/or configuration changes of various termination);
complexity);
• information (VNF package) management;
NS • Terminate VNF (release VNF-associated NFVI
VNF • configuration management (initial configuration and
resources and return it to NFVI resource pool)
NVF Orchestrator (NFVO) update);
VNF 3.1.3 Network Functions Virtualisation Infrastructure • performance management;
VNF Network Functions Virtualisation Infrastructure • Indicator management
(NFVI) resources under consideration are both
• fault management
virtualised and non-virtualised resources, supporting
virtualised network functions and partially virtualised Virtualised resource management:
VNF network functions.
• direct/indirect, reservation;
VNFC
Virtualised resources are offered for use through • capacity, fault, performance;
VNFC VNF Manager (VNFM) abstracted services, for example: • network forwarding path;
• Network, including: networks, subnets, ports, • information;
VNFC addresses, links and forwarding rules, for
• quota, allowance
the purpose of ensuring intra- and inter-VNF
connectivity; Other requirements are also considered for:
• Compute including machines, and virtual machines, • Multi-Tenancy (Tenant management);
as resources that comprise both CPU and memory; • Infrastructure resource management;
• Storage, including: volumes of storage at either • Software image management;
Virtualised Infrastructure
block or file-system level
Manager (VIM) • NFV acceleration management;
• Security consideration;
Virtual Switches SDN
Storage
machines & Routers controllers • Policy administration

Source: Orange

10 11
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

3.3 Other NFV related architectures In the case of the OSM project, as shown in Figure
In NFV reference architecture, the VIM can play 4, the SDN controller is a well-defined part of the Figure 4: OSM architecture mapping onto ETSI NFV framework elements
the role of an SDN application, sitting on top of the resources managed by the Resource Orchestrator,
northbound interfaces of the SDN controller. The rather than accessing it exclusively through the VIM
VIM delegates to the SDN controller the connectivity interface. This provides finer control of network
management of virtualised network resources that configuration, decouples resource and cloud-native GUI & Design-Time Tools
lifecycle management and supports multi-VIM services OSS/BSS
are required by network services and their constituent
network functions. This architecture does not propose at the Resource Orchestrator level.
a direct interface between the NFV-O and SDN
controllers. However, in some architecture (e.g. AT&T Network Service Orchestrator
ECOMP architecture), a Master Orchestrator for NFV EMSs
and SDN acts as an NFV-O and as a direct consumer
of the APIs exposed by an SDN controller. Specific
NFV Management and Orchestration
VNFMs

VNFs
Figure 3: ECOMP orchestration architecture
Resource Orchestrator
Ve-Vnfm VNF Configuration
PNFs (Includes VIM/SDN
& Abstraction
Management & Orchestration Connectors)

OSS/BSS
NFV Orchestrator NFVI

Application Nf-Vi
Controller
ODL
EM EM EM EM
OpenVIM OpenStack OpenVIM

VNF VNF VNF VNF VNF Network Floodlight


Controller
Main NFV reference points

Infrastructure Source: OSM Project


Cloud Controller
NVF Infrastructure (NVFI)

In another architectural approach, the SDN


Orchestrator can be separated from the NFV
Source: ECOMP www.openecomp.org Orchestrator (e.g. Open-O architecture) to manage
the SDN service connectivity independently from NFV
(e.g. for VPN on Demand use case). In this approach, a
Global Service Orchestrator GS-O is placed on the top
of the SDN-O and NFV-O orchestrators.

12 13
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

Figure 5: Open-O orchestration architecture Figure 6: possible NFV based network management and
orchestration architecture
GS-O
GUI Portal
UMO (Unified Management
Abstract NBI Legacy OSS
and Orchestration)
Service Service Service
Lifecycle Mgr. Decomposer Formation

EMS (Legacy) EMS (New) VNFM


SDN-O NFV-O
GUI Portal GUI Portal

Abstract NBI Abstract NBI


TAS CSCF SBC vTAS vCSCF vSBC
SDN Lifecycle Mgr.
SDN Monitor NVF Monitor PNFs VNFs
VPN
NS Lifecycle Mgr.
SDN Res. Mgr. Traffic Optimise NVF Res. Mgr.
VIM
Source: China Mobile
Abstract SBI Abstract SBI

SDN ACCESS/WAN SDN EMS/NMS VIM SDN NVF SDN VNFM VIM
Driver Controller Drivers Driver Drivers Driver Controller Drivers Driver Drivers The UMO is a combination system that has the 3.4.2 Example of 5G Telco-MANO architecture
capability of network orchestration, VNF and NS ETSI’s Network Functions Virtualisation (NFV)
lifecycle management. It also covers policy design Industry Specification Group (ISG) is defining NFV-
and management, resource management and VNF MANO architecture. This is a framework for the
Source: Open-O www.open-o.org
FCAPS management. management and orchestration of all resources in the
cloud computing infrastructure as well as NS and VNF
The benefit of this architecture is that the role and lifecycle management.
3.4 Best Practices responsibilities of legacy OSS and UMO are clear,
3.4.1 Planning an NFV based network management separate and defined. The UMO can be considered Some network functions are hard to transform to
and orchestration architecture a unified system designed to manage the whole virtualised network functions (VNFs) and will remain
Figure 6 shows an example of an architecture for a virtualised network. All the information needed for as physical network functions (PNFs).
future NFV based network management strucuture a mobile network service, VNF and NS resource
from an implementation based on China Mobile’s management will be handled by the UMO only, which These hybrid physical and virtual network
network. In this architecture, the complete network has no impact on the legacy network. environments should be considered for a 5G Telco
management system can be divided into two parts. management and orchestration architecture. 5G Telco-
The right section is a sub-system managing VNFs MANO is required to provide end-to-end network
under UMO (Unified Management and Orchestration). provisioning for 5G network slicing on demand and
The UMO is China Mobile’s NFV based network one-view network monitoring instead of monitoring
management and orchestration system. The left physical and virtual network(s) separately. 5G Telco-
section shows the legacy OSS: in order to avoid having MANO should also be easy to implement.
to reconstruct the existing sub-system, the legacy
OSS will stay unchanged and will continue to manage
existing PNFs. An interface between legacy OSS and
UMO is not precluded and could be a proprietary
interface, based on operators’ requirements.

14 15
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

Figure 7 shows an example of a 5G Telco-MANO In addition to NFV-MANO defined interfaces, Figure


architecture. 6 shows interfaces between an E2E orchestrator

4
and domain controllers as well as between domain
In this architecture, NMS-Assurance is used for end- controllers and EMS that are necessary for the 5G
to- end network assurance. NMS-Assurance is the Telco MANO architecture to work.
most widely used network assurance system in PNF
networks and can be extended as a virtual networks By following this approach, a 5G Telco-MANO, end-
assurance system with the help of EMS and VNF. Thanks to-end on-demand network provisioning and one-
to the reuse of NMS- Assurance, end-to-end network view network assurance in physical and virtual hybrid
assurance can be easily implemented to avoid the networks can be achieved.
complexity of reconstructing a system from scratch.

Virtualised
E2E orchestrator and domain controllers are new
elements designed to support end-to-to-end network
provisioning and configuration. In each network domain,
a network controller (for example, Transport-SDN,

network security
Cloud SDN) will provision and configure the network
function with an open interface regardless of whether
they are physical or virtualised network functions, with
the interfacing of an E2E orchestrator. In this way, an
E2E orchestrator can provision a 5G network slice using
both PNFs and VNFs end-to-end.

Figure 7: Possible end-to-end management and orchestration


architecture for 5G

Customer Portal/OSS/BSS

E2E Infra Manager

NMS E2E Orchestrator


SON
(E2E Assurance) (E2E Provisioning/Control

Repository NFV-O

Domain Controller
EMS VNFM
(Adaptation)

EMS

VNF
PNF (vCore-C, vCore-U..)
(AU, OLT...)
VFVI VIM

Source: KT

16 17
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

4.1 Introduction 4.2 Architectural Challenges 4.3 Best practices 4.4 Conclusions
NFV can greatly amplify existing security problems This section lists the security aspects that The GSMA Fraud and Security Group’s (FASG) • Security for NFV is still a work in progress
in terms of impact. The vulnerabilities are similar operators deploying a virtualised network need preliminary discussions on NFV security highlighted 5 • Security involves all NFV architecture components
to those of today, but instead iNFV concentrates to take into account. key security risks operators need to take into account: (VNF level, NFVI, MANO)
them in one place and increases the likelihood of • Legal and Regulatory Compliance failure: Core risks
• Integrity of infrastructure and VNF • LI community requires the strongest requirements
a common mode failure. In many ways, it puts all are about geographic deployment and security of
our “security eggs in one basket”. In traditional • Several Trust Domains: • LI Requirements / Security for LI Function will
solutions, particularly in heterogeneous environments;
telecommunications equipment, a number of factors depend on National Regulations / Countries
–– A Trust Domain is a collection of entities that • Isolation Failure: Core risk is around functions
helped to frustrate would be attackers such as physical share security policies • Still quite difficult to establish the right level of
“escaping” from allocated resources, enabling
security, proprietary software, hardware, installation requirements for RFI/RFP
–– Even in the context of a single CSP: prejudicial data access to extensive areas of
and configuration and reduced the ability to exploit
–– a dedicated trust domain for LI in addition to information (at rest, in motion or in memory);
vulnerabilities. 4.5 Actions
an admin trust domain • Denial of Service: Risks include flooding of public
4.1.1 Maturity –– Regulation geographical constraints with location interface or resource exhaustion (e.g. on internal • All vendors must be able to credibly answer (with
No vendor is at an advanced stage when it comes to attestation ensuring that LI can only take place network or memory); evidence) a set of basic questions around the
compliance with national security regulations regarding on known POI/IAP security of their NFV products in accordance with
• Topology Validation and Enforcement: Risk is
NFV. A number of interested parties are working hard ETSI TS 103 308 [30]
• Separation of LI function executions from other VNF around malicious configuration (e.g. VM layer
with standardisation bodies to include and embed and Hypervisor is considered a requirement misconfiguration); • Operators should consider a delay in the use of
security from the ground up. We do not anticipate NFV where sensitive functions are involved, unless
–– Segregation of Lawful Interception information/ • Security Logging and Incident Management:
seeing mature NFV products/ solutions implementing appropriate mitigations are available
flows. Monitoring behaviour of infrastructure Risks arise from failures to log or manage issues
the latest security standards (e.g. ETSI NFV SEC) • Government regulatory advice should provide
should not decrease the confidentiality of a from complex interactions across domains
in the near future. Therefore, any product currently greater clarity, now, on the potential security risks
Lawful Interception solution
available today is highly unlikely to have the required FASG also elaborated on mitigation strategies for the around NFV, and be able to legally and competently
security built in. Indeed, many NFV vendors are new –– Encrypted targets DB in a separate/secured above risks highlighting the importance of a strong deal with this topic
to telecommunications security concepts. The cloud context cooperation between operators, manufacturer and
technologies being used to underpin NFV are not of –– Secure Encryption where appropriate regulators. Three recommendations
the maturity required to underpin Critical Network –– a location to store “properly” keys ensuring that are made:
Infrastructure (CNI) and iits related obligations. they can’t be compromised by e.g. a privileged • Vendors shall be required to adopt best-of-breed
hypervisor manager or other process. security features as specified by ETSI NFV SEC and
The main threat vectors for a virtual network remain
fundamentally unchanged: –– Secure execution operators:

• Loss of availability: Attacks that result in crashing –– Location attestation means


a virtual network element or rendering it unusable –– Root of Trust (NFV SEC 007 [27]).
through flooding/denial of service; –– Multiple Trust Domains (NFV SEC 013 [28]).
• Loss of confidentiality: Either caused by –– Execution Enclaves for Sensitive Applications
eavesdropping or leakage of sensitive data; (NFV SEC 012 [29])
• Loss of integrity: Resulting from a modification of
• The open-source community needs to be motivated
data during transit (man-in-the-middle-attack)
to include basic security measures. A “fixing as we go
or in the virtual network element, as well as from
along” approach is not suitable for this environment;
unauthorised access to a virtualised network function;
• Everyone needs to develop a secure architecture
• Loss of control: Loss of control can take place at
with separate zones of trust
the network level where the attacker controls the
network exploiting a protocol or implementation
flaw or at virtual function level
Another threat that needs to be considered in
virtualised networks is the possible absence of a single
entity overseeing the whole network. This is because
a virtual network (Figure 1) can be easily subdivided in
to different administrative domains each with different
elements requiring the establishment of secure
interaction between themselves.

18 19
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

5
Carrier grade
NFV/ Reliability

20 21
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

5.1 Introduction 5.1.2 The essential value of carrier-grade reliability 5.1.3 NFV carrier-grade reliability challenges When service providers refine their plans to introduce
5.1.1 Carrier-grade Telecom networks must be always-on and guarantee With all the industry initiatives around NFV, network NFV into their networks, they are also reviewing
In telecommunications, “carrier-grade” refers to a a level of service because society, business and reliability has become a hot topic, as shown in a survey the implications for high reliability on a network
system, or hardware or software component that is industries increasingly depend on reliable connections published by Heavy Reading in Jan 2015, as well as infrastructure that incorporates virtualised functions.
extremely reliable, well tested and proven. Carrier for both routine and critical communications. some challenges experienced by the industry when
implementing NFV: There are numerous initiatives underway currently
grade systems are tested and engineered to meet or
Always-on reliability is mandatory and telecom service to specify, align and promote NFV carrier-grade
exceed the “five-9s” (99.999%) availability standards, • Service recovery in a multi-layer or multi-vendor
providers have built their networks, reputations and capabilities for achieving efficient carrier-grade
that provide resiliency and fast fault recovery. environment
revenue streams on a foundation of carrier-grade NFV solutions. These include ETSI NFV Proof of
reliability. A carrier-grade network guarantees a ‘five- • Carrier-grade reliability when NFV has components Concept, Open-Platform for NFV project, Carrier
Product or service development within the
9s’ availability standard, that allows for no more than with a lower grade of reliability Network Virtualisation Awards, ATIS (The Alliance for
telecommunications industry has traditionally followed
rigorous standards for stability, protocol adherence 5.27 minutes of downtime per year per service. If there • New skills and process requirements Telecommunication Industry Solutions) and various
and quality, reflected by the use of the term ‘carrier- is just one failure in the system, the NOC (Network • Multi-component interoperability management supplier ecosystems.
grade’ to designate equipment demonstrating this Operations Centre) will be notified and proceed with
• Security concerns
reliability. Over time, telecom service providers have remediation in less than 5 minutes so that the five-9s
target can still be met. Hence there is an overwhelming • Complexity in E2E problem demarcation
engineered an extensive range of sophisticated
features into their networks, to the point where they need to automate the entire process, including quick
can guarantee their high reliability. service recovery processes and to provide a seamless
transfer from the failing element to healthy elements.
However, it is difficult to achieve the same grade of high
reliability in each component of the NFV network. What This level of service is typically required by high-value Figure 9: Challenges faced by the NFV Testing Market
is important for service providers is to be able to offer enterprise customers who often will pay a premium for
carrier grade services that meet the required availability, Service Level Agreements that specify high availability.
reliability and performance requirements for end-to-end Carrier-grade scalability and robustness 27.2%
voice, video, data or converged-services.
Seamless control and provisioning of physical
and virtual networking infrastraucture 23.7%
Openness and interoperability 17.1%
Real-time and dynamic provisioning 13.5%
Figure 8: The benefits of Carrier-grade NFV for Operators NFV global reach and cross administration 10.3%
Other 8.2%

0% 5% 10% 15% 20% 25% 30%

Reduce Improve
Cost of Poor Customer Source: Heavy Reading Mobile Networks Insider
Quality Churn

Benefits
Increase Protect
O&M Efficiency Revenue

Enhance
Brand
Image

22 23
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

5.1.4 NFV carrier-grade reliability scope 1. Each product should be highly reliable and fault 3. Most of the challenges are in network maintenance.
Practically, there are 3 key areas in achieving NFV-driven resilient. Different types of resiliency can be applied Even if a redundant network is deployed, failures
carrier-grade reliability: product, network deployment such as “1+1” or “N+M” (simple 1+1 redundancy can happen. Therefore, it is critical to follow a
(design and integration) and network maintenance. is deprecated as a recommended strategy proactive, predictive and pre-emptive approach
for resilience). For stateful applications, data that identifies incidents before they impact users.
synchronization and restoration mechanisms should This can be achieved using extensive telemetry
be in place for state continuity in case of component to monitor the different components in the NFV
Figure 10: End-to-End Carrier-grade Reliability Scope failure. Furthermore, to respond to a failure of a network. Moreover, this complexity and scale
physical or virtual element within an NFV platform, requires fault conditions to be identified by network
the management software must be able to detect probes with management tools in place that
Network Deployment failed components, hosts, or virtualisation solutions should be responded to by pre-programmed event
Product Network Maintenance
(Design & Integration) (e.g. VMs) immediately and recover automatically, responders (autonomics – big data analytics. This
if possible through an autonomous response allows the creation of algorithms to perform tasks
Unified Monitoring
mechanism (example: virtual machine migration). within seconds that may otherwise take operations
Application

Active/Stand-by
Distributed
Pooling engineers hours or days to resolve.
Design
2. Networks should be deployed in a way so that 1. When large scale failure does occur, emergency
Quick Service Recovery
N+M Redundancy failure in a node will not impact service continuity. handling capabilities are needed to recover the
This can be achieved with distributed design across services quickly and minimize impact.
Contingency Plan
multiple sites, deploying additional resources
HA1: VM N+M Redundancy Resource Security 2. Organizations must ensure staff have the right
and proper dimensioning. Also, it is important
Cloud OS

Clustering Hardening
skills as well as the appropriate tools and right
Demarcation capabilities to consider a feature deployment and system
processes in place. They must also ensure
HA2: VM Migration configuration that can protect a network from
network management capabilities meet the
Fault Detection different threats. It is desirable that the network is
same dependable level of carrier-grade reliability
Dimensioning Resilient Design able to identify events or drivers in the network as
expected by customers.
COTS

HA: Multiple NICs, SPs, RAID Automation well as external to the network that could degrade
or otherwise impair the quality or availability of
the supplied services. For example, if a network
Solid plan involving different components and solutions to build a bridge received a significant increase in traffic beyond the
level it was engineered to expect.

NOTE: ETSI NFV ISG (Industry Specification Group)


Carrier Grade has provided some guidelines and best practices on
Enterprise (IT)
Reliability product reliability and resilient network design [27].
Reliability 99.9%
99.999%

Source: Huawei

24 25
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

5.2 Carrier Grade Service – Requirements for 5.3 NFV Reliability Assessment Standard
NFV Reliability In order to provide an ultra-reliable, highly secure Figure 12: Carrier-Grade NFV Reliability Assessment Framework
As illustrated in the diagram below, there is a daunting and fully connected network, an in-depth and
list of requirements for achieving carrier-grade comprehensive NFV network assessment framework
Network Resource Network Network Network Operations &
reliability and deliver the always-on connectivity has been developed. 6 Dimensions
Health Capacity Protection Evolution Handling Maintenance
expected by service providers and their customers.
Such reliability is attained by complying with a very
Hardware Software Overload Inter- Network Staff /
stringent criteria of availability, security, performance, Health Licensing Protection operability Information Organisation
serviceability and management requirements, which (Example: Skills
Design and
fall into six primary dimensions (6D) for a NFV-driven Virtualisation
Physical Autonomous Zero
Topology)
carrier-grade system. Layer Health Response downtime Tools/
Resources
Mechanism Software Platforms
(Example: Upgrade Emergency (Example:
VNF Health Virtual Case Network
360° Link
Machine Processes Telemetry)
Assessment Utilisation Deployment
Elements/ Migration) of new
Figure 11: Requirements for Carrier-Grade NFV Reliability Formulas Connectivity function, Disaster
feature, Recovery Processes
Scaling Security technology Capabilities

Grey Failure
Hardware
Load
Resiliency upgrade and
Balancing
expansion
MANO

Carrier-Grade
Reliability Alarms/
Input Design Statistics Configuration Topology Processes Features
Log-files

Source: Huawei
Availability, Performance,
Security, Serviceability,
Management 1. Network Health 2. Resource Capacity
NFV brings a lot of new challenges to operators due How efficiently and effectively resources are utilised
to its architecture. With regards to network health, (e.g. software, hardware, links) is critical for NFV
operators need to consider several new elements network reliability. Operators need to monitor and
NFV 6D Assessment Standard when compared to PNF (physical network function) avoid overloading resources above the network’s
Network Health, Resource Capacity, Network Protection, that should be in a healthy status, otherwise they designed thresholds and maintain load-balance
Network Evolution, Emergency Handling, Operations & Maintenance may impact a network’s reliability. Also, if there is between the resources. NFV introduces scaling
(Measurement, Results, Gap Analysis, Benchmarking, Improvement) deterioration in a basic service KPI then it should be capabilities in order to enhance a network’s agility
treated quickly and automatically, to minimize the and reliability.
downtime or eliminate the impact on users. Some
of the critical elements which should be monitored 3. Network Protection
Source: Huawei
regularly and proactively include hardware and Networks should be protected from all possible
software components, the virtualisation layer as threats which can impact services. NFV brings a
well as connectivity and network performance. number of new challenges such as cloud computing,
Predictive fault detection becomes more important component scalability and resiliency, information,
in NFV, because applications use infrastructure cyber security and network access provisioning. A
delivered by other vendors. For example, operators network should be protected from known threats,
should identify grey failures in advance, such as a such as signalling storms (overload protection),
memory leak or CPU overutilization (based on a denial of service attacks and hardware or software
traffic model) that have not yet affected the service failures. A network should be designed properly for
performance and end users. its resilience (no single point of failure) and should
be able to recover automatically when possible
(migration, reconstruction etc.). A robust network
shouldn’t be vulnerable to any of these threats.

26 27
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

4. Network Evolution 6. Operations & Maintenance 5.5 Conclusion


A network is always evolving with the introduction In order to maintain high reliability, operational Carrier-grade is demanding, but it is an essential
of new features, functions, services, technologies, efficiency is critical. ICT operational transformation is feature of today’s telecom networks to maintain
software upgrades and hardware equipment etc. taking place in operator organizations to adopt NFV strict reliability requirements as both the enterprise
NFV increases the complexity further with a larger technology. Service providers need to build teams customers or consumers have been conditioned to
number of components and vendors. A reliable, with skilled staff for new technologies and products, expect extreme reliability in our networks. However,
high-performance network might be impacted after efficient tools for monitoring (e.g. telemetry), with careful planning and the assistance of telecom-
a change in one of the layers. For example, when a fault (e.g. root cause analysis) and performance system engineering experts, NFV network and service
vendor’s hardware is incompatible with some of the management, processes for routine maintenance designers (new versions of service software will
components for a server capacity expansion which considering the dynamic environment of NFV be necessary to fully utilise the new opportunities
creates interoperability issues impacting network networks. For example, an added complexity in NFV of virtualisation), service providers can build this
reliability. As a result, openness is critical in driving is driven by the implementation on an as needed capability into their NFV deployments and then, with
innovation and enhancing reliability. Open interfaces basis. Historically once an application was put into carrier-grade systems to confidently commercialize
(APIs) play a vital role in building carrier-grade the network it stayed in the network. Going forward their NFV services, knowing that they will meet
services. Additionally, it is important to introduce applications will be applied to the network as needed business and technology objectives while satisfying
software upgrade procedures with zero downtime then all or a part of them will be removed. In this their customers.
in order to minimize the impact to end users. situation, the configurations of the network will be
changing on an ongoing basis. Service providers know that they need to continue to
5. Emergency Handling meet those expectations as they transition to NFV.
Failures may happen any time in the network. Without this assurance for NFV, they run the risk of
Quick recovery and service continuity are very 5.4 Best Practices
losing their high-value customers and seeing increased
important, so emergency handling capabilities, 5.4.1 Use case scenarios subscriber churn which could offset the many business
including skills, processes, information (network All actors in the industry are invited to use the above benefits provided by NFV. No new technology is
topology) and automation, are essential. That is framework to build use cases to get carrier-grade worth that risk, regardless of the potential saving in
important for physical networks, but in NFV we reliability results, to maintain openness, and to avoid CAPEX and OPEX. So, in order to provide an ultra-
need to consider recovery in this more complex, vendor or technology lock-in. At this juncture, China reliable, highly secure and full connected network, a
multi-layer environment. Mobile and Huawei have announced partnerships to robust, 360 degree, in-depth analytical NFV network
carry out the laboratory testing on top of live systems. assessment framework is required.

Figure 13: Carrier-Grade NFV Reliability Assessment Methodology

Input 6 Dimensions E2E Assessment Assessment Results

Statistics Network
Health
Resource
Configuration Capacity
Assessment Systems

O&M Resource
Network Capability Capacity
Alarms/Log-files Health Network
Protection
6 Dimensions
Design and their 0

O&M elements 20

Capability 40
Topology Emergency 60
Handling Network 80 Network
Processes Network Evolution Protection
100
Evolution
Emergency
Features
Handling

Source: Huawei

28 29
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

6
Migration

30 31
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

6.1 Introduction 3 – Vertical Interoperability Verification As an example the case of MME deployment is 6.2.2 Software upgrades
This section describes migrations and software In NFV, there are multiple components provided discussed here. In this example, the operator who has The types of NFV software to be upgraded are
upgrades from both a deployment and software usually by different vendors. Each layer’s software has launched commercial LTE services is going to migrate identified in [11]. These are as follows;
upgrade aspect after the l aunch of a virtualised to be upgraded or updated periodically. Any change to its native MME to a virtualised one. In general, the • VNF domain software
network launch. Operators should consider any layer may impact the interoperability and therefore operator has to keep the existing native MMEs operating
• MANO domain software
interoperability between entities comprised of PNF the service performance. Before implementing a so that it can continue to serve existing users, therefore
sotfware upgrade in the network, it is important to the operator would initially introduce the virtualised • NFVI software
and VNF. Not all network functions are well-suited to
be virtualised and in this section, we examine three verify it in an operator’s test bed (or any other external MMEs as additional facilities. In this example, newly From those components, the most critical one is the
categories from an operator perspective. LAB), mirroring the exact environment with the same added vMMEs are added to an existing MME pool. VNF, since it provides the services. The process should
components end-to-end. Once it is verified, the ensure a zero-downtime software upgrade in order
6.1.1 Migration from physical network to virtualised software release could then be safely rolled-out in the After a certain period of time, the EOSL (End of
Service Life) of the existing native MMEs is reached, to provide high availability (including planned and
network live environment.
the operator may want to introduce the Next unplanned downtime) and improve a user’s experience.
This category considers several migration paths from
4 – Software upgrade/update frequency Generation core network (NGCN) to access one of its The NFVI software upgrade process is not as complex
physical to virtualised, e.g., single functionality level
Vertical layout may be composed by different vendors unique functions e.g. network slicing. In this example, as VNFs, but the process should protect service
virtualisation, PNF/VNF-mixed operation in the unique
and each vendor may provide software releases the deployment approach is described as a combo- continuity. Finally, the MANO software upgrade process
functionality (e.g., the operation which includes vMME
(patches or versions) in different time periods. Some node deployment of both EPC and NextGen core. can not impact the service, but only operations (e.g.
and existing MME in the same pool), operation without
vendors may release software packages once a month, commands, auto-scaling may not work etc.).
utilizing NFV orchestrator etc.
some quarterly or semi-annually etc. Each time, a There are several different processes to be followed for
6.1.2 Software upgrades multi-vendor verification process may be needed, software upgrades based on industry best practice.
Several aspects should be considered in this category, which is time consuming and requires additional Figure 14: MME migration path For each component, the same or different strategy
for example, VNF application software upgrade, NFVI resources. Operators should plan accordingly and may be executed and this depends on:
(e.g., host OS/hypervisor) upgrade and VIM upgrade consider how to optimize the process per case.
(e.g., OpenStack). There are also some other important 4G 5G • Software architecture
differences in software upgrade procedures between 6.1.3 Interoperability • Availability of Additional resources
NFV and traditional networks. This category considers the interoperability between Native • Traffic migration capabilities
the physical entity and the virtualised entity or MME
1 – Process • Network Design
network connection using virtualised networking i.e.,
The software architecture is different for each VNF, and SDN in the NFV configuration. Addition
so consequently, the software procedure should be to an Virtualised
MME
adjusted accordingly. It is recommended that the VNF
existing Figure 15: VNF Architecture
6.2 Best practices pool
structure and number of VNFCs be considered, before
upgrading the VNF. Another difference between NFV 6.2.1 Migration
and a traditional network is that in the NFV it is possible Two possible approaches to introduce virtualised
Each VNF may be
to access a shared pool of resources (i.e. servers) that products in an operator network following the launch
VNF1 composed of 1 or
can be used when a process needs them. This provides of commercial LTE services are discussed below. EOSL multiple VNFCs
flexibility to operators or vendors who could apply a 1. Introduction of a new system for newly developed
different strategy based on their needs. services (e.g., IoT services, facilities for MVNOs and
EPC + NextGen Core
services for the enterprise customers);
2 – Zero downtime VNFC1 VNFC2
2. Expansion to existing facilities
Each VNF/VNFC may be composed of several
instances and this could provide more flexibility As the introduction of new systems for newly VNFCI VNFCI VNFCI VNFCI
Source: KDDI
to operators in order to perform a zero-downtime developed services is not necessarily a migration, the 1 2 N 1
software upgrade. rest of this section will focus on area of expansion.

Each VNFC may have 1 or multiple instances (parallable)

Source: Huawei

32 33
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

1. Using VNF in Pool, so it is easier to migrate traffic 6.3 Requirements


from one VNF to another one. Then upgrade the

7
6.3.1 Migration
“empty” (not loaded) VNF without risk. The following aspects should be considered for the
migration from physical to virtualised:
2. Rolling SW Upgrade (instance by instance), it is
applicable when there are multiple instances. It is used • It should be possible to share PNF and VNF
for Active-Active or Active Stand-By mode, to isolate an resources for the same network function
instance, upgrade it and then put it back to the traffic. NOTE: The “resources” are not the resources which
are provided by the NFVI, such as compute, storage
3. Scale-out/Scale-In process, when deployment of or network resources
VNFC instances with the new SW (in the same VNF),
• In a mixed environment consisting of both physical
migrate traffic to them and kill old instances (scale-in).

Performance benchmark
and virtualised network functions, it should be
Additional resources are needed.
possible to maintain the same interfaces between
4. New VNF deployment, initially instantiate a new network functions
VNF, migrate traffic to that one and then terminate the

for NFV infrastructure


6.3.2 Software upgrades
“old” VNF. Traffic migration may require configuration
The following elements should be considered for
from external nodes.
software upgrades;
5. NFVI SW Upgrade (i.e. host OS, KVM, Open V • The traffic should be switched seamlessly for all the
switch or DPDK) uses live VM migration to minimize methods of SW upgrade described above
the impact. VMs are migrated from NFVI (old SW) to • Migration of active VNFs (live migration) from the
the upgraded NFVI area and continue upgrading all compute node in operation to the maintenance zone
the resources. should be executed without interruption when VIM
6. MANO SW Upgrade process is not as critical as software or NFVI software will be upgraded. If the
other components, since there is usually no service interruption occurs, it should be minimized
impact. Any method highlighted above could be used • Required hardware acceleration functionality should
based on the SW architecture. be available for the destination of the migration
• Due to complexity, automated software upgrade /
update process is preferred
• Quick roll-back process in case of failure
• Ensure zero downtime for the services during
VNF upgrade

34 35
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

7.1 Performance benchmark scope In addition to the vendors and operators’ own 7.2 State of the art in NFV performance benchmarking In the OPNFV Colorado release, test cases covering
When NFV was brought to the industry, it was claimed tests, many standard organizations and open In OPNFV, there are several test projects which have Performance/Speed and Capacity/Scale are available,
to help operators shorten their service time to market source communities are very supportive of NFV been initialized to benchmark the performance of Reliability/Availability part will be finished in the
and offer agility in system expansion, while simplifying performance benchmarking experiments. Usually a NFV system and its components. Yardstick and coming releases.
network operation through the use of common this work will involve test framework and traffic Bottlenecks are the names given to projects used
generators, as benchmarking could not be performed The scope of Yardstick is the development of a test
servers. However, since NFV is built on common x86 to benchmark system level performance, while
in live networks. Other common characteristics of framework as well as test cases and test stimuli to
servers, service level performance is often questioned. StorPerf, VSPerf and CPerf define methodology
performance benchmarking work are as follows: enable NFVI verification. This methodology is aligned
Given the circumstances, vendors and operators in benchmarking storage, virtual switch and SDN
with ETSI TST 001 [18].
should team up to provide some performance metrics • Include testing instructions that are sufficiently controller performance respectively.
and carry out tests. specified (prerequisites, procedures, output) The Bottlenecks [13] project aims to find system
Yardstick [12] is a project that aims to verify the
• Results are repeatable bottlenecks by testing and verifying the OPNFV
Each single portion of the NFV system can be infrastructure compliance from the perspective of a
• Test cases can be performed on different vendor’s infrastructure in a staging environment before
benchmarked, for example, VNF performance, NFVI VNF. Based on the uses cases that have been defined
device/system committing it to a production environment. It defines
performance, storage performance, virtual switch in ETSI GS NFV 001 [17], each use case implies specific
an automatic method for executing benchmarks to
performance etc. Each level of these performance • The produced results are useful and meaningful for requirements and complex configuration on the
validate the deployment during the staging phase.
benchmarks will help operators to decide which the users underlying infrastructure and test tools. In order to find
The framework has four components: Workload
product will fit into their NFV systems. From the end- a system level benchmark, in Yardstick, every single
In this chapter, state of the art NFV performance generator and VNFs (WV), Monitor and Analysis (MA),
to-end service perspective, it is possible to benchmark VNF work-load performance metric is broken down into a
benchmarking is outlined. Performance metrics, test Deployment and Configuration (DC), Automated
service deployment. For example, how quickly a NFVI number of characteristics/performance vectors and each
methodologies and use cases that have been defined Staging (AS). The architecture is shown as follows:
could be set up, how long it would take to upload a performance vector is then represented by a test case.
VNF package and how long to instantiate a VNF or will be helpful for vendors and operators who want to
a Network Service etc. Based on these benchmarks, carry out the tests in their own labs.
operators can tell if it is feasible to deliver a low cost,
high performance solution based on NFV.

Figure 17: YardStick performance metrics and test suite


Figure 16: NFV performance benchmark scope Performance/Speed Capacity/Scale Reliability/Availability
Compute • Latency for random memory access • Number of cores and threads • Processor availability (error free
• Latency for cache read/write • Available memory size processing time)
operations • Cache size • Memory availability (error free
Projects Working Groups Test Framework SUT/DUT/FUT for NFV • Processing speed (instructions per • Processor utilisation (max, average, memory time)
second) standard deviation) • Processor mean-time-to-failure
• Throughput for random memory • Memory utilisation (max, average, • Memory mean-time-to-failure
access (bytes per second) standard deviation) • Number of processing faults per
ETSI Sufficiently Defined VSwitch
• Cache utilisation (max, average, second
• TST-001 Instructions
standard deviation)
• TST-002 Controllers
Test Framework Network • Throughput per NFVI mode (frames/ • Number of connections • NIC availability (error free
• PER-001
+ byte per second) • Number of frames sent/received connection time)
• IFA-003 Repeatable Results Storage
Traffic Generator • Throughput provided to a VM • Maximum throughput between VMs • Link availability (error free
(frames/byte per second) (frames/byte per second) transmission time)
OPNFV
NFV1 • Latency per traffic flow • Maximum throughput between NFVI • NIC mean-time-to-failure
• Yardstick Applicable to Different
Vendors • Latency between VMs nodes (frames/byte per second) • Network timeout duration due to link
• Bottleneck
Management • Latency between NFVI nodes • Network utilisation (max, average, failure
• StorPerf
• Packet delay variation (jitter) standard deviation) • Frame loss rate
• VPerf
Benchmarking Useful and Meaningful Reliability between VMs • Number of traffic flows
• CPerf
Results for Users • Packet delay variation (jitter)
Servers between NFVI nodes
IETF (BMWG)
Test Traffic Storage • Sequential read/write IOPS • Storage / Disk Size • Disk availability (error free disk
• Virtual-Net-04
Framework Generator Unambiguous Output • Random read/write IOPS • Capacity allocation (block-based, access time)
• HA-NFVI-01 VNFs
• Latency for storage read/write object-based) • Disk mean-time-to-failure
operations • Block size • Number of failed storage read/write
• Throughput for storage read/write • Maximum sequential read/write IOPS operations per second
Source: Huawei
operations • Maximum random read/write IOPS
• Disk utilisation (max, average,
standard deviation)

36 37
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

TST 001 provides an informative report on methods for IFA 003 specifies performance benchmarking metrics
Figure 18: Bottlenecks test framework pre-deployment testing of the functional components for virtual switching, with the goal that the metrics
of an NFV environment, including VNFs, NFVI and will adequately quantify performance gains achieved
MANO. The recommendations focus on lab testing and through virtual switch acceleration conforming to the
Automated the following aspects of pre-deployment testing: associated requirements specified herein. It defines the
Staging (AS)
• Assessing the performance of the NFVI and its critical aspects of vSwitch performance by treating the
Workload vSwitch as a Device Under Test (DUT), with specific
generator
VNF VNF Monitor and ability to fulfil the performance and reliability
Analysis (MA) requirements of the VNFs executing on the NFVI configurations that are consistent across instantiations
WV of a vSwitch on a computing platform. It also uses
• Data and control plane testing of VNFs and their
the existing testing and benchmarks specifications
interactions with the NFV Infrastructure and the
(see [22], [23], [24] and [26]) to measure the
NFV MANO
performance of the DUT under specific configurations
• Validating the performance, reliability and scaling and conditions, such as vSwitch physical to physical,
Hypervisor ODL DPACC OpenStack
Deployment and capabilities of Network Services
Configuration vSwitch virtual to virtual, etc.
Infrastructure (DC)
TST 002 provides interoperability test methodology In IETF, the draft-ietf-bmwg-virtual-net-04
that is applied to NFV by analysing some of the core [22] document researched by Benchmarking
Source: OPNFV Bottlenecks project NFV capabilities and the interactions between the Methodology Working Group (BMWG) has defined
functional blocks defined within the NFV architectural the considerations for benchmarking virtual network
framework required to enable them. It describes functions and their infrastructure. This document
The workload generator generates workloads which The Network Service Benchmarking (NSB) is an open two types of testing: Conformance Testing and investigates additional methodological considerations
go through VNFs, and then analysis units will monitor source framework that allows benchmarking and Interoperability Testing. necessary when benchmarking VNFs instantiated and
the infrastructure and VNF status. Test results will characterization of VNFs by testing with real-life traffic hosted in general-purpose hardware, using bare-metal
PER 001 provides a list of minimal features which
then be analysed to find out the system bottleneck. scenarios on Bare Metal, Standalone Virtualised, and hypervisors or other isolation environments such as
the VM Descriptor and Compute Host Descriptor
Therefore, a wide range of different hardware Managed Virtualised environments. The NSB test Linux containers. It lists several new benchmarks and
should contain for the appropriate deployment of
resources and software configurations will be used to harness is inherited from the OPNFV Yardstick open related metrics, such as time to deploy VNFs, time to
VM Images over an NFVI, in order to guarantee
locate a system’s bottleneck. source solution (also upstream the patches back to migrate VNFs, time to create a virtual network in the
high and predictable performance of data plane
Yardstick community developed in test harness), general-purpose infrastructure, etc. it also defines
The Storage Performance Benchmarking for NFVI workloads while assuring their portability. In addition,
and incorporates a benchmarking methodology that several new considerations which must be addressed
(StorPerf) [14] is a project that aims to provide a tool the document provides a set of recommendations
facilitates deterministic and repeatable benchmarking to benchmark VNF and their supporting infrastructure,
to measure block and object storage performance in on the minimum requirements which hardware and
on Industry Standard High Volume (SHV) servers. It like hardware configuration parameters (shelf
an NFVI. The project will define a test suite, including hypervisor should have for a NFVI suitable for different
provides several VNFs: vCG-NAPT, vACL, vFW, vPE, occupation, CPUs, caches, memory), etc.
test cases, metrics and test process to find the workloads (data-plane, control-plane, etc.) present in
vEPC as the samples for demonstration, and it also can
benchmarks, which can provide a good preview of VNFs. According to the workload analysis in clause Another document, “Considerations for Benchmarking
integrate 3rd-party VNF as the benchmarking tool for
expected storage performance behaviour for any type 6, clause 7, it provides a recommendation on the High Availability of NFV Infrastructure” [27]
operators, which can help in characterizing VNFs by
of VNF workload. minimum requirements that a Compute Host should lists additional considerations and strategies for
measuring Network, VNF and NFVI KPIs:
have for a NFVI suitable for data-plane workloads, and, benchmarking high availability of NFV infrastructure
The vSwitch Performance (VSPerf) [15] project will • Network KPIs: e.g. Traffic Generator KPIs like clause 8 gathers the list of features which the Compute when network functions are virtualised and performed
develop a generic and architecture agnostic vSwitch packets in, packets out, throughput, latency as per Node Descriptor and the VM Descriptor templates in NFV infrastructure. With VNFs and NFVI replacing
testing framework and associated tests, which will RFC 2544 etc. should contain for the appropriate deployment of VM the legacy network devices, operators have several
serve as the basis for validating the suitability of • VNF KPIs: e.g. packets in, packets out, packets Images over an NFVI, in order to guarantee high and issues to cope with such as availability, resiliency and
different vSwitch implementations in a Telco NFV dropped, etc. predictable performance while preserving portability non-measurable failures. Above all, they want to
deployment environment. • NFVI KPIs: e.g. CPU utilisation, IPC, L1/L2/LLC across different servers. ensure the availability of the VNF products and their
The Controller Performance Testing (CPerf) cache hit/misses, iTLB/dTLB hit/misses, OVS stats, infrastructures. From the operator point of view, the
[16] project will serve as a performance testing memory bandwidth & latency, etc. availability is the most important feature and the
environment for the SDN controller portion of the benchmarking tests for the high availability of NFV
In ETSI, ETSI GS NFV-TST 001 [18], TST 002 [19], PER
large, realistic, automated deployments required by infrastructure are also important. This document
001 [20] and IFA 003 [21] have been produced by ETSI
OPNFV. The initial focus of CPerf is OpenDaylight, but investigates considerations for high availability of NFV
Industry Specification Group (ISG) to benchmark the
later-on the project tends to leave the controller part Infrastructure benchmarking tests.
NFV-related performance and test methods.
of the test matrix open and will welcome collaboration
with other controller communities.

38 39
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

8
Vertical
interoperability

40 41
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

8.1 Introduction 8.3 Challenges and potential risks 3. Service Assurance 8.4 Best Practices
Physical mobile networks are made up by equipment When vendors use non-standardised non- Service performance and high availability are also Incompatible systems elements or software versions
provided by multiple vendors in general. This is made standardised interfaces there could be potential risks dependent on interoperability. When there is a failure can cause further network faults, and require
possible by the clear definition of open interfaces in the network. Some of the potential impacted areas in the network, the information should be propagated compatibility management. The key elements are to
between the network nodes specified by 3GPP. are described below: quickly to the upper layers, based on the standard use standardised interfaces and proper compatibility
Such a multi-vendor environment fosters innovation interfaces so that each component can use this validation processes.
and competition, resulting in advantages both for 1. Vertical Integration information effectively. For example, a hardware
operators and subscribers. With characteristics such as hardware-software failure should trigger an alarm to users allowing them 1. Standardised Interfaces
decoupling and hardware generalization, NFV further to act immediately. NFV solutions should be based on interoperable multi-
It will be beneficial for virtual networks to be made by opens up carriers’ network architecture. NFV is one vendor ecosystems with open source technologies
equipment provided by multiple sources. huge complex ICT systems integration project, involving Automation also plays an important role in NFV or standardised protocols and interfaces. ETSI’s IFA
multiple technologies, interfaces and multiple vendors. lifecycle management and different components have Workgroup focus on interface standardisation and
in-built self-healing mechanisms (i.e. VM migration in several open source projects have developed platforms
8.2 Requirements for vertical interoperability It is important that vertical cloud platform integration case of host failure). These mechanisms are triggered based on this, such as OPNFV, OPEN-O, OSM etc. There
Figure 18 highlights an example of a virtual network is performed smoothly and quickly. Interoperability under specific conditions, such as notifications that have also been several documents released by ETSI.
where individual components are procured from a plays a key role in vertical integration, especially in a have been received from the network. If this kind of Figure 20 shows some of the important work done by
number of different vendors. multi-vendor ecosystem. information is not received then the system will not the ETSI IFA and SOL Working Groups.
recover automatically, and cause network outage.
For networks to operate correctly it is important that 2. Network Service Deployment 2. ETSI Plugtests
the interfaces between the individual blocks of the Interoperability can cause problems in Network Service 4. Software Upgrade ETSI identified the need for thorough industry
architecture are tightly specified and implemented. deployment, since multiple components provided by Any change in the software of a component, in any interoperability testing and took on the initiative to
different vendors are involved during this process. This layer, could cause problems to the other layers. start organizing NFV Plugtests. They will offer test
Failing to define interoperable interfaces is expected
includes from OSS/BSS and Portals up to NFVO, VNFM, Consequently, this could impact existing services and sessions where vendors and Open Source projects will
to result in a higher total cost of ownership as well as a
VIM, Cloud OS and COTS. Descriptors, such as NSD, their users. Vertical verification is recommended in be able to assess the level of interoperability of their
slower time to market. Operators will need to ensure that
VNFD should also follow the standardised format for a order to test interoperability. Horizontal verification implementations and verify the correct interpretation
the open source community developing the architecture
successful service instantiation. challenges remain the same as in traditional network, of the ETSI NFV specifications.
understand the importance of vertical interoperability.
so there is no real difference.

Figure 20: MANO to IFA Mapping – reference points


Figure 19: example of multivendor virtual network
Reference of the functional specification
IFAxxx
IFA013 (stage 2) ETSI GS NFV IFA XXX
Orchestrator SOL005
OSS/BSS NFV Orchestrator vendor Reference of the solutions specification
OSS NFVO SOLxxx
(stage 3) ETSI GS NFV SOL XXX
Os-Ma
EM EM EM EM
REST APIs IFA014
Management & Orchestration

NFV IFA007
SOL003 SOL001
Manager(s) IFA011
VNF VNF VNF VNF VNF Or-Vnfm SOL001 NSD
IFA008
Service, SOL002
VNF and EM & NFV Descriptors
Infrastructure VNFM Or-Vi (templates)
Virtual resources Description
VNF
Ve-Vnfm
Compute Storage Network
VNF IFA011
Execution
Vi-Vnfm Package SOL001
IFA002 VNFD
Virtualisation layer IFA018
IFA006
Hardware Virtualised
Infrastructure IFA004 IFA005
IFA019
Compute Storage Network Manager(s)
NFVI VIM
Open Stack APIs TOSCA/YAML Profile
Nf-Vi (extensions required) +CSAR archive format
Infrastructure vendors
Source: ETSI NFV

42 43
CONSIDERATIONS, BEST PRACTICES AND REQUIREMENTS FOR A VIRTUALISED MOBILE NETWORK

The component for the test sessions are Virtual Network


Functions (VNFs), Management and Orchestration
(MANO) solutions and NFV Infrastructure (NFVI) with
pre-integrated Virtual Infrastructure Manager (VIM).

3. Integration and Verification


Most of the interoperability issues appear during
the integration phase. Multiple vendors are involved
in this phase, so cooperation and coordination are
important. Either operators or one of the assigned
services suppliers should lead this complex project
and act as a prime system integrator, having
extensive IT and CT experience, in order to deliver
an integrated E2E solution.

A proper verification plan is required for interface


compatibility and service validation. For this purpose, an
operator’s test bed could be used, using the same multi-
vendor ecosystem. Alternatively, a vendor’s NFV Lab
could be used for solution validation or pre-packaged,
pre-integrated and pre-tested solutions. The same
process applies for a software upgrade process.

44
Find out more at
www.gsma.com/network2020

GSMA HEAD OFFICE


Floor 2
The Walbrook Building
25 Walbrook
London EC4N 8AF
United Kingdom
Tel: +44 (0)20 7356 0600
Fax: +44 (0)20 7356 0601

Potrebbero piacerti anche